نتایج جستجو برای: anomaly based detection

تعداد نتایج: 3344676  

Journal: :Discover Internet of things 2023

Abstract Internet-of-Things (IoT) connects various physical objects through the Internet and it has a wide application, such as in transportation, military, healthcare, agriculture, many more. Those applications are increasingly popular because they address real-time problems. In contrast, use of transmission communication protocols raised serious security concerns for IoT devices, traditional ...

2013
Kamini Nalavade B. B. Meshram

Intrusion detection is an integral part of computer security. It improves the security of information systems by allowing the review of patterns of access in order to discover abnormal activity of users and serving as a deterrent to users attempts to bypass system privilege or protection mechanisms. Anomaly detection systems, a subset of intrusion detection systems, model the normal system/netw...

2015
Jinwon An Sungzoon Cho

We propose an anomaly detection method using the reconstruction probability from the variational autoencoder. The reconstruction probability is a probabilistic measure that takes into account the variability of the distribution of variables. The reconstruction probability has a theoretical background making it a more principled and objective anomaly score than the reconstruction error, which is...

2010
M H Bhuyan J K Kalita

As the communication industry has connected distant corners of the globe using advances in network technology, intruders or attackers have also increased attacks on networking infrastructure commensurately. System administrators can attempt to prevent such attacks using intrusion detection tools and systems. There are many commercially available signature-based Intrusion Detection Systems (IDSs...

2011
Monowar Hussain Bhuyan D K Bhattacharyya J K Kalita

As the communication industry has connected distant corners of the globe using advances in network technology, intruders or attackers have also increased attacks on networking infrastructure commensurately. System administrators can attempt to prevent such attacks using intrusion detection tools and systems. There are many commercially available signature-based Intrusion Detection Systems (IDSs...

Journal: :IJCNIS 2011
Monowar H. Bhuyan Dhruba Kumar Bhattacharyya Jugal K. Kalita

As the communication industry has connected distant corners of the globe using advances in network technology, intruders or attackers have also increased attacks on networking infrastructure commensurately. System administrators can attempt to prevent such attacks using intrusion detection tools and systems. There are many commercially available signature-based Intrusion Detection Systems (IDSs...

Journal: :J. Network and Computer Applications 2007
Yihua Liao V. Rao Vemuri Alejandro Pasos

Anomaly detection holds great potential for detecting previously unknown attacks. In order to be effective in a practical environment, anomaly detection systems have to be capable of online learning and handling concept drift. In this paper, a new adaptive anomaly detection framework, based on the use of unsupervised evolving connectionist systems, is proposed to address these issues. It is des...

2014
Yonglong Yan Jian Li Wenzhong Gao

Data collected from the supervisory control and data acquisition (SCADA) system, used widely in wind farms to obtain operational and condition information about wind turbines (WTs), is of important significance for anomaly detection in wind turbines. The paper presents a novel model for wind turbine anomaly detection mainly based on SCADA data and a back-propagation neural network (BPNN) for au...

2010
Ruoyi Jiang Hongliang Fei Jun Huan

Principal Component Analysis based anomaly detection approaches have been extensively studied recently. However, none of these approaches address the problem of anomaly localization. In this paper, we proposed a novel approach based on PCA to perform anomaly detection and localization in sensor networks simultaneously. By enforcing the joint sparsity across the Principal Components in the abnor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید